Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation

The Monthly Download—July 2024

Wallet? Check. Diary? Check. Laptop? Uh oh… laptop…? Laptop???

Picture this: It’s a typical Wednesday evening, and your employee Jane is heading home after a productive day at the office. She’s balancing her coffee cup, a shopping bag, and her work-issued laptop as she steps onto the train. It’s only when she gets home that she realizes, with a sinking feeling, that her laptop is nowhere to be found. Is it still on the train, maybe?

And then panic sets in as she remembers all the sensitive data stored on that device.

This scenario is a nightmare, but it doesn’t have to turn into a full-blown crisis. Having a solid plan in place can mitigate the risks associated with a lost or stolen work device.

Here’s what you should do if you or one of your team finds yourself in Jane’s situation:

First and foremost, create an environment where employees feel comfortable reporting a lost or stolen device immediately. Jane needs to know that the sooner she informs the company, the better. Emphasize that there will be no blame or punishment – what matters most is safeguarding the data.

Ensure that all work-issued devices have remote wiping capabilities. This is your first line of defense. When Jane reports her laptop missing, your IT team should be able to remotely wipe the device, erasing all data to prevent unauthorized access.

Before a device is lost, proactive measures can make a world of difference. Make sure all company devices are encrypted. Encryption converts data into a code to prevent unauthorized access. Even if someone gets hold of Jane’s laptop, encrypted data remains inaccessible without the proper decryption key. Most modern operating systems offer robust encryption options.

Always enforce strong password policies. Jane’s laptop should have a complex password and, ideally, two-factor authentication (2FA). This adds an extra layer of security, making it harder for anyone to access the data if they bypass the initial password protection.

Regular training is vital. Employees should understand the importance of device security and the steps to take if a device is lost or stolen. Conduct workshops and send reminders about security protocols. The more informed Jane is, the quicker and more effectively she can respond to the loss.

Why are these steps so crucial? If Jane’s laptop falls into the wrong hands, the consequences can be severe. Unauthorized access to customer files can lead to identity theft and loss of client trust. Exposure of financial data could result in significant loss and legal consequences. Proprietary information could be stolen and sold. It’s a nightmare.

By implementing these strategies, you can sleep easier knowing that your company’s data remains secure, even if a device goes missing. It becomes a minor annoyance not a disaster.

If we can help you create and implement a plan for this kind of scenario. Get in touch.

What's happening at RCT this month?

At RCT, we've been bustling with client projects while taking time to enjoy the sunshine. This month has been a blend of productivity and pleasant weather, making our workdays even more delightful.

Business gadget of the month

Jabra Stealth Bluetooth headset: If you take many calls but are always on the go, a Bluetooth headset could save you time (and arm ache). You don’t need to stop what you’re doing to answer the phone each time a call comes in. And if you spend a lot of time in noisy places, it’ll help cancel out that background noise and give you a better call quality.

The Jabra Stealth Bluetooth headset not only looks great but is also a light and comfortable option. It comes with additional ear cushions and hooks for a truly personalized fit.

$145.98 from Amazon.

Technology Update

Tech giants join forces to combat online scams

Some of the world’s biggest tech companies, like Meta, Match Group, and Coinbase, have joined forces to form Tech Against Scams. It’s a new cross-industry coalition to help reduce the amount of successful scams online.

And it has created a platform where people can share knowledge and best practice on how to fight common scams. Last year people were conned out of more than $2 billion.

Tech facts

  • On April 30, 1993 the directors of CERN released the source code of the World Wide Web into the public domain, making it freely available to anyone, without licensing fees. This was at the urging of its creator Tim Berners-Lee and allowed the web to flourish.
  • The first wristwatch with the ability to make phone calls was the Samsung SPH-WP10, released in 1999.
  • The first widely used web browser was Mosaic in 1993.

Inspirational quote of the month

“In today’s era of volatility, there is no other way but to re-invent. The only sustainable advantage you can have over others is agility, that’s it. Because nothing else is sustainable, everything else you create, somebody else will replicate.”

—Jeff Bezos, Founder, Amazon

A New Month, A New Tech Quiz

1) In an August 2021 blog post, CEO Ryan Roslansky approved permanent remote work for employees of which business-oriented social network?

2) What delicious computer term did web browser programmer Lou Montulli coin to refer to information that is sent from the browser to the web server?

3) What does “IOT” stand for?

4) What device was announced in 2007 with this slogan: “This is only the beginning”?

5) Wi-Fi is a family of wireless network protocols modelled after the IEEE 802 set of LAN protocols. What does LAN stand for?

The answers are below.

  1. LinkedIn
  2. Cookie
  3. Internet of Things, such as your refrigerator and Alexa
  4. iPhone
  5. Local Area Network

New to Microsoft 365

You can block employees taking screenshots in Edge

Data privacy for your business is critical. But it’s not only cyber criminals you need to be wary of. Sometimes, your staff could be (intentionally or unwittingly) sharing your confidential data using screenshots on their browser.

Microsoft is stepping in with screenshot prevention tools in Edge. You’ll be able to tag webpages as protected, stopping any unapproved copying of the data.

For any help or advice, get in touch. It’s what we do.

Rivercity Tech
Article Written by Rivercity Tech

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Featured image
The Monthly Download—June 2024
Passwords. They’re the keys to our digital kingdoms, but also the biggest pain in our necks. They’ve been around since the dawn of the internet, and guess w...
Featured image
The Monthly Download—May 2024
Passwords. They’re the keys to our digital kingdoms, but also the biggest pain in our necks. They’ve been around since the dawn of the internet, and guess w...
Featured image
The Monthly Download—April 2024
Here’s the deal: Even if you invest in cyber security training, changing long held password habits can be a tough nut to crack. People love convenience, and r...
Rivercity Technology Services LTD logo
We are your IT department. How would you like to manage your risk?
201-116 Research Dr,
Saskatoon, SK
S7N 3R3

306-933-3355

Copyright © 2024 - All Rights Reserved

crossmenu